Early Education

University launches institute-wide initiative for human and machine intelligence research

Massachusetts Institute of Technology's (MIT's) Intelligence Quest—MIT IQ—is designed encourage... » more

Process instrumentation training offered to military veterans

Endress+Hauser announced it will provide free training to military veterans on process... » more

System integrators looking to improve customer relations, skills gap

CFE Media’s interviews of three representatives from the 2018 System Integrators of the Year focus... » more

Workforce education becomes an essential task

Five essential competencies for the digital era identified. » more

University receives grant for connected systems institute

The University of Wisconsin-Milwaukee announced a $1.7 million gift from Rockwell Automation to... » more

Electronics lab dedicated to global manufacturer

Harting and North Central College in Naperville, Ill., officially opened the Harting Electronics... » more

Six traits for excellent engineers

Engineers who aspire to be great have common traits such as good communication skills, a heightened... » more

Women mentors are helping change the face of engineering

Recruiting for skilled engineers for science, technology, engineering, and mathematics (STEM)... » more

Case Studies

View All Case Studies

Videos

View All Videos

Cyber Security: Technology Review

A very fast paced look at many types of hardware and software involved in security efforts, including keyboard sniffers, Ethernet routers, smart phones, and all sorts of common network devices. It may seem a bit overwhelming, but...

Cyber Security: Common Exposures

What are the ways that cyber criminals get into industrial networks? How can you find the vulnerabilities in your systems? There are all sorts of entrance strategies that hackers use. Once you understand these, you can begin to...

Cyber Security: Understanding OSINT

Open source intelligence (OSINT) and social engineering are techniques that hackers use to get information about your networks with the intent of finding weaknesses. Some are technical, but others may be efforts to get your...

Cyber Security: Control System Cyber Security

Why is security important, and what is going on in the defensive arms race? What are the effects of intrusions? Many intrusions are relatively minor, but what is the worst case for your facility if a hacker gets past the defenses?

Cyber Security: Communications Attack Example

An actual demonstration of how an attacker can get between a controller and HMI and override information moving both directions. It isn’t as difficult as you might think.

Webcasts

View All Webcasts

Research

2017 Programmable Controller Software, Hardware Study

Respondents to the 2017 Programmable Controller Software and Hardware... » more

View All Research

Online Training Center

Overview

Part 1 of the Motors and Drives Series describes...

View All Video Series

eGuides

Integrated Safety eGuide

Process industries are inherently hazardous, and maintaining safety in processes and operations has become increasingly complex and costly.

View All eGuides

click me